More

    An OpenPGP.js flaw just broke public key cryptography




    • There is a way to verify fake messages as if they were legitimate
    • The bug affects multiple versions of OpenPGP.js
    • A patch is available

    A security flaw in the JavaScript implementation of OpenPGP.js allows threat actors to verify fake messages as if they were legitimate, essentially breaking public key cryptography. This is according to security researchers Edoardo Geraci and Thomas Rinsma of Codean Labs, who found and recently reported the vulnerability.

    OpenPGP.js is an open-source JavaScript library that allows developers to encrypt, decrypt, sign, and verify messages using the OpenPGP standard. Normally, when a user signs a message digitally, it makes sure the content wasn’t tampered.

    https://cdn.mos.cms.futurecdn.net/YsReok3f8M9yESRDbeGJVH.jpg



    Source link

    Latest articles

    spot_imgspot_img

    Related articles

    Leave a reply

    Please enter your comment!
    Please enter your name here

    spot_imgspot_img